Gibson> Download Garbage
search
⌘Ctrlk
Gibson> Download Garbage
  • Statement of purpose
  • Techniques
    • Intelligence Gathering
    • Initial Access
    • Execution
    • Privilege Escalation
    • Defense Evasion
    • Credential Access
      • Extract credentials from LSASS dump
      • Extract credentials from registry hives
      • LSA secrets extraction
      • Dumping LSASS.exe
      • Dumping registry hives
      • Dump the domain (Domain Controllers)
      • Browser cookies & passwords
      • Wi-Fi passwords
      • Clipboard
    • Infrastructure
    • Web application testing
    • Other
    • Red Team Infrastructure
    • Malware
    • Automation
  • Tools
    • Tools
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Techniques

Credential Access

Extract credentials from LSASS dumpchevron-rightExtract credentials from registry hiveschevron-rightLSA secrets extractionchevron-rightDumping LSASS.exechevron-rightDumping registry hiveschevron-rightDump the domain (Domain Controllers)chevron-rightBrowser cookies & passwordschevron-rightWi-Fi passwordschevron-rightClipboardchevron-right
PreviousMicrosoft Windows Defenderchevron-leftNextExtract credentials from LSASS dumpchevron-right

Last updated 5 years ago

Was this helpful?

Was this helpful?